24
i Contents i-Net+ Certification Study Guide Introduction ..................................................................... xxv Who Should Study this Course ............................................... xxv Prerequisites ............................................................................ xxv Important Notes About Certification ............................................ xxv Exam Objectives ..................................................................... xxvi How to Study .......................................................................... xxvi Features .............................................................................................. xl Learning Objectives, Unit Summaries, Discussion Questions, and Activities/Exercises .................................................................. xl Key Terms .......................................................................................... xl Resources Available in Instructor-led Settings .................................. xl Why Choose WestNet? .................................................................... xli CompTIA Authorized Quality Curriculum (CAQC) ........................ xli What's the best way to study for CompTIA certifications? ...... xli What types of programs does CompTIA evaluate? .................. xlii How can I tell if a training material is CompTIA Authorized Quality Curriculum? .......................................... xlii How does CompTIA authorize these programs? ..................... xlii Why did CompTIA develop the Authorization program? ....... xlii What if the CompTIA logo is used? Does the CompTIA logo signify CAQC? .............................................. xlii How can I learn more about CompTIA CAQC program? ....... xliii CAQC ............................................................................................. xliii How to Become CompTIA Certified .............................................. xliii

Contents i-Net+ Certification Study Guidestore.westnetlearning.com/mkt/catalog/toc/i-Net+_v7.0_toc.pdf · Contents i-Net+ Certification Study Guide Introduction ... Quiz ... ISPs

  • Upload
    vanliem

  • View
    219

  • Download
    1

Embed Size (px)

Citation preview

i

Contentsi-Net+ Certification Study Guide

Introduction ..................................................................... xxv

Who Should Study this Course ............................................... xxvPrerequisites ............................................................................ xxv

Important Notes About Certification ............................................ xxvExam Objectives .....................................................................xxviHow to Study ..........................................................................xxvi

Features ..............................................................................................xlLearning Objectives, Unit Summaries, Discussion Questions,

and Activities/Exercises ..................................................................xlKey Terms ..........................................................................................xlResources Available in Instructor-led Settings ..................................xlWhy Choose WestNet? ....................................................................xliCompTIA Authorized Quality Curriculum (CAQC) ........................xli

What's the best way to study for CompTIA certifications? ......xliWhat types of programs does CompTIA evaluate? ..................xliiHow can I tell if a training material is CompTIA

Authorized Quality Curriculum? ..........................................xliiHow does CompTIA authorize these programs? .....................xliiWhy did CompTIA develop the Authorization program? .......xliiWhat if the CompTIA logo is used? Does the

CompTIA logo signify CAQC? ..............................................xliiHow can I learn more about CompTIA CAQC program? .......xliii

CAQC .............................................................................................xliiiHow to Become CompTIA Certified ..............................................xliii

i-Net+ Certification Study Guide

ii

Unit 1Review of Network Fundamentals ......................................1

Lesson 1Internal Computer Components: CPU, I/O, Memory, and NICs ................................................................9

CPU ....................................................................................................9I/O ....................................................................................................10

Video Display ............................................................................12Memory ............................................................................................12NICs ..................................................................................................13

Different Networks, Different NICs ..........................................13Each NIC is Unique ...................................................................14NIC Connectivity in a PC .........................................................14Summary of NIC Characteristics ...............................................15

Activities ...........................................................................................16

Lesson 2Software ..............................................................................18

Programs and Processes ....................................................................18Master/Slave ..............................................................................19Peer-to-Peer ...............................................................................19Client/Server ..............................................................................19

Client/Server Advantages ...................................................20Independent Computing Architecture ..............................20

Hosts ..........................................................................................20Application Software ........................................................................21Operating Systems ............................................................................21Device Drivers ..................................................................................22Network Management Software .......................................................22Activities ...........................................................................................23

Lesson 3Network Topologies ............................................................25

Types of Networks ............................................................................25Bus Topology ....................................................................................26Star Topology ...................................................................................27Ring Topologies ................................................................................28

Ring ...........................................................................................28Star Ring ....................................................................................30

Wide Area Topologies ......................................................................31Mesh ..........................................................................................32Network Cloud ..........................................................................33

Advantages of Cloud Networks ..........................................34Hybrid Topologies ............................................................................34Logical and Physical Topologies ......................................................34

Physical Star, Logical Bus ..........................................................34Physical Star, Logical Ring ........................................................35

Activities ...........................................................................................36

Contents

iii

Table of C

on

tents

Lesson 4Network Performance Concepts ..........................................39

Response Time, Delay, and Latency ................................................39Response Time in a Master/Slave Configuration .............................40

Polling Delay .............................................................................41Link Delay .................................................................................41Component Latency .................................................................41CPU Delay .................................................................................41

Response Time in a Client/Server Configuration ............................41NIC Delay ..................................................................................42Physical Media Delay ................................................................42Server Delay ...............................................................................42Public Network Delay ................................................................42

CPU Utilization ................................................................................43Link Utilization ................................................................................44

Capacity .....................................................................................44Bandwidth .................................................................................45Throughput ...............................................................................45

Activities ...........................................................................................47

Lesson 5Review of the OSI Model .....................................................48

Programs, Processes, and Protocols ..................................................48Protocols ....................................................................................49

Layers of Protocols and Services ......................................................49Benefits of Layering ...................................................................50Peer Protocols ............................................................................50Basic Protocol Operations .........................................................50

Primary Functions of OSI Model Layers ..........................................51Physical Layer ............................................................................52Data Link Layer .........................................................................52Network Layer ...........................................................................53Transport Layer .........................................................................54Upper Layers: Session, Presentation, and Application .............54

Logical and Physical Addresses ........................................................55Physical Addresses .....................................................................55Logical Addresses .......................................................................56

Activities ...........................................................................................57

Lesson 6Review of Internetworking Devices ......................................59

Repeaters ..........................................................................................59Repeater Advantages .................................................................60Repeater Disadvantages .............................................................60When to Use Repeaters .............................................................61

Hubs .................................................................................................61Hub Advantages ........................................................................61Hub Disadvantages ....................................................................63When to Use Hubs ....................................................................63

i-Net+ Certification Study Guide

iv

Bridges ..............................................................................................63Bridge Advantages .....................................................................64Bridge Disadvantages ................................................................65When to Use Bridges .................................................................66

Switches ............................................................................................66Switch Advantages ....................................................................68Switch Disadvantages ................................................................68When to Use Switches ...............................................................69

Routers ..............................................................................................69Routers Rebuild Frames .............................................................70Internet Routers ........................................................................71Router Advantages ....................................................................71Router Disadvantages ................................................................72When to Use Routers ................................................................72

Brouters ............................................................................................73Gateways ..........................................................................................73

Gateway Advantages .................................................................74Gateway Disadvantages .............................................................74When to Use Gateways .............................................................74

Activities ...........................................................................................75Summary .............................................................................77Quiz ....................................................................................80

Unit 2E-Commerce .......................................................................87

Lesson 1E-Commerce Business Considerations ..................................93

Types of E-Commerce ......................................................................93B2C ............................................................................................94

Growing Share of the Retail Market ...................................94B2B ............................................................................................94C2C or Marketplace ..................................................................95C2B ............................................................................................95B2E .............................................................................................96B2G ............................................................................................96Aggregator Model ......................................................................97Portal Model ..............................................................................97

Directories ..........................................................................97Search Engines ....................................................................98

Necessary Features of E-Commerce Sites .........................................99Is E-Commerce Worthwhile for Every Business? ...........................100Barriers to Entering the E-Commerce Arena ..................................100

Incompatible Business Models ................................................101Lack of Leadership and Experience .........................................101Cost of Entry ...........................................................................101

Activities .........................................................................................102

Contents

v

Table of C

on

tents

Lesson 2Globalization and Localization ...........................................103

Speaking the Language ..................................................................104Localized Content ...................................................................105The High-End Approach: Region-Specific Sites ......................105The Low-End Approach: Translation Links ............................106Search Engine Hooks ...............................................................106

Laws and Regulations .....................................................................106Your Products ..........................................................................107

United States Law .............................................................107Your Expression .......................................................................108Your Business Methods ...........................................................108

Privacy ............................................................................................109Practical Concerns ..........................................................................109

Currency ..................................................................................109Time Zones and Calendars ......................................................110Social Values and Customs .....................................................111

Activities .........................................................................................113

Lesson 3Cash Flow on the Internet .................................................115

Online Credit Card Transactions ...................................................116Players in an E-Commerce Transaction ..................................116Step-by-Step Online Credit Card Transaction ........................117E-Commerce Transaction Flow ...............................................117

Electronic Cash ..............................................................................119eCash .......................................................................................119CyberCash ...............................................................................120Mondex ...................................................................................120First Virtual PIN .......................................................................121

Electronic Wallets ..........................................................................122Smart Cards ....................................................................................122Activity ...........................................................................................124

Lesson 4E-Commerce Development Options ..................................125

Technical Considerations for E-Commerce Applications ..............125Web Server and Database Issues .............................................126Application Business Logic .....................................................126

Buy, Build, or Outsource? ..............................................................127Buy a Turn-Key Development Package ...................................128Build with a Template-Based Development Package ..............128Build with a Fully Custom Application Toolkit ......................129Outsource to an Application Service Provider ........................129

Activities .........................................................................................131

i-Net+ Certification Study Guide

vi

Lesson 5Intellectual Property ...........................................................133

Four Types of Intellectual Property ................................................134Copyright .......................................................................................134

What Is Protected? ..................................................................134What is Not Protected? ...........................................................136How a Work Gains Protection ................................................136

Copyright Notice ..............................................................136Registration ......................................................................137

Infringement ...........................................................................138Fair Use ....................................................................................138

Trademarks .....................................................................................139What is Protected? ..................................................................139Limits to Trademark Protection ..............................................140How a Trademark is Claimed and Protected ..........................140Infringement ...........................................................................142Domain Names and Trademarks .............................................142

Patents ............................................................................................142Patents and the Web ...............................................................143

Trade Secrets ...................................................................................144Activity ...........................................................................................145

Lesson 6Crime, Privacy, and Other Legal Issues ...............................147

Crime and the Internet ..................................................................148New Frontier, Old Crimes .......................................................148New Laws, New Crimes ...........................................................149

Computer Fraud and Abuse Act .......................................149CDA ..................................................................................149COPA ................................................................................149COPPA ..............................................................................150CPPA .................................................................................151CIPA ..................................................................................151State Computer Crime Laws ............................................151

Geography, Crime, and the Web ...................................................152Obscenity and Community Standards ..........................................153Contracts and Civil Law .................................................................153Lawsuits and Jurisdiction ...............................................................154Framing and Deep Linking ............................................................155DMCA .............................................................................................156

Limitation of Liability for Online Service Providers ...............156“Trafficking” in Copy- and Access-Control Devices ...............157

Under Construction .......................................................................157Activities .........................................................................................158

Summary ...........................................................................160Quiz ..................................................................................161

Contents

vii

Table of C

on

tents

Unit 3Internet Connectivity Technologies ................................167

Lesson 1Overview of the Internet ....................................................173

Early History of the Internet ..........................................................173Enter the World Wide Web ...........................................................174Who Owns the Internet? ...............................................................175Internet Standards ..........................................................................175

Standards-Making Organizations ............................................175The Standards Process .............................................................176RFC ..........................................................................................177Internet Drafts .........................................................................178

Equipment ......................................................................................179The Internet Hierarchy ..................................................................179

Tier 1 .......................................................................................179Tier 2 .......................................................................................180Autonomous Systems ..............................................................180NAPs ........................................................................................180 ISPs .........................................................................................181How the Hierarchy Works ......................................................181

Internet, intranet, and Extranet .....................................................181Activities .........................................................................................183

Lesson 2Point-to-Point and Point-to-Multipoint Services .................184

Common Point-to-Point Services ..................................................185POTS Analog Connections .............................................................185

Modems ...................................................................................186Dial-Up Lines ...........................................................................187Leased Lines ............................................................................187

T-Carriers and E-Carriers ................................................................188T1 Bandwidth ..........................................................................188DS Hierarchy ...........................................................................189FT1 ...........................................................................................190Customer Premise Equipment for T-Carriers ..........................191

ISDN ...............................................................................................192How ISDN Works ....................................................................192BRI ...........................................................................................193PRI ...........................................................................................194Channel Bonding ....................................................................195

SONET ............................................................................................196SONET Rings ...........................................................................197

Common Point-to-Multipoint Services .........................................197DSL .................................................................................................198

Types of DSL Service ...............................................................199DSL Bandwidth ................................................................200DSL Physical Requirements ..............................................200

i-Net+ Certification Study Guide

viii

DSL Network Configuration ...................................................201DSL Access Device ............................................................202DSLAM ..............................................................................202DSL Protocol Architecture ................................................202Always On? .......................................................................202DSL Security Concerns .....................................................203Routers for Improved Security .........................................203

Cable Modems ................................................................................203Cable Modem Configuration ..................................................204Cable Modem MAC .................................................................205

Shared Bandwidth ............................................................205Security .............................................................................206

Activities .........................................................................................207

Lesson 3Switched WAN Services .....................................................209

Types of Switched Services .............................................................210X.25 ................................................................................................210Frame Relay ....................................................................................211

Frame Relay Characteristics ....................................................213Frame Relay Implementation ..................................................214

ATM ................................................................................................215Transfer Modes ........................................................................216ATM Characteristics ................................................................217

Activities .........................................................................................219

Lesson 4Options for Internet Connectivity and Remote User Access ...........................................................221

Home Dial-Up Internet Access .......................................................222Data Link Protocols for Dial-Up Access ..................................223

SLIP ...................................................................................223PPP ....................................................................................224

Microsoft ICS ...........................................................................224Setting Up the ICS Gateway .............................................225Setting Up ICS Clients ......................................................225ICS Security Precautions ...................................................226

DSL for Home Internet Connectivity ............................................226Sharing a DSL Connection ......................................................226

Pay for Fixed IP Addresses ................................................227Internet Connection Sharing ...........................................227PPPoE ................................................................................227

Connecting a Business to an ISP ....................................................227Nondedicated Access ...............................................................228Dedicated Access .....................................................................229Components of a Dedicated Connection ...............................229

Common Carrier Connection ..........................................229DSU/CSU ..........................................................................230Router ...............................................................................230

Contents

ix

Table of C

on

tents

Internet Domain Name ....................................................230Remote Access Services ..................................................................231

RAS Installation and Configuration ........................................232Analog Dial-Up Modem Access ...............................................233ISDN Access .............................................................................234

Virtual Private Networks ................................................................235Tunneling Protocols ................................................................236

PPTP ..................................................................................236How a PPTP Session Works ..............................................236L2F Protocol .....................................................................237L2TP ..................................................................................238IPSec .................................................................................238

ICA Terminal Services .............................................................238Activities .........................................................................................241

Summary ...........................................................................243Quiz ..................................................................................244

Unit 4TCP/IP Protocols ..............................................................249

Lesson 1The TCP/IP Protocol Suite ..................................................256

TCP/IP Protocol Layers and the OSI Model ...................................256Network Interface Layer Protocols ..........................................257Internetwork Layer Protocols ..................................................257Transport Layer Protocols .......................................................258Application Layer Protocols ....................................................259

Communication Using TCP/IP ......................................................260Application Layer ....................................................................260Transport Layer .......................................................................260Network Layer .........................................................................261Network Interface Layer ..........................................................262Destination Station .................................................................262

Activities .........................................................................................263

Lesson 2IP .......................................................................................265

Overview of IP ................................................................................265Best-Effort Service ....................................................................266Multiplexing Protocols ............................................................267

IP Packet Encapsulation .................................................................268IP Version 6 ....................................................................................268

IPv6 Address Format ................................................................269IPv4 Compatibility ..................................................................270

ICMP ...............................................................................................270ICMP’s Purpose and Limits .....................................................270Encapsulation ..........................................................................271Message Types .........................................................................272

i-Net+ Certification Study Guide

x

Destination Unreachable (3) ............................................273Time Exceeded (11) ..........................................................273Parameter Problem (12) ....................................................273Source Quench (4) ............................................................273Redirect (5) .......................................................................274Echo Request (8) and Echo Reply (0) ...............................274Timestamp Request (13) and Timestamp

Reply (14) ......................................................................274Information Request (15) and Information

Reply (16) ......................................................................274Address Mask Request (17) and Address Mask

Reply (18) ......................................................................274Activities .........................................................................................275

Lesson 3UDP and TCP .....................................................................278

Features Common to Both UDP and TCP .....................................279Demultiplexing Based on Port Number ..................................280Ports and Addressing ...............................................................281Well-Known Port Numbers .....................................................282

UDP ................................................................................................283TCP .................................................................................................283

Basic Data Transfer ..................................................................284Reliable and Sequenced Packet Delivery .................................284Flow Control ...........................................................................284Multiplexing and Demultiplexing ..........................................285Connection Establishment .....................................................285

Sockets ..............................................................................285Activities .........................................................................................286

Lesson 4Internet Addressing ...........................................................289

IP Addresses ....................................................................................289Class A Address ........................................................................290Class B Address ........................................................................290Class C Address .......................................................................291Class D Address .......................................................................291Class E Address ........................................................................292

Dotted Decimal Notation ...............................................................292Addressing Rules ............................................................................293Sample Network Using Class A Address Format ............................294Getting an IP Network Address ......................................................295

Public Networks ......................................................................295Private Networks .....................................................................295

Activities .........................................................................................297

Contents

xi

Table of C

on

tents

Lesson 5Subnetting Fundamentals ..................................................299

The Value of Subnetting ................................................................299The IP Address Crisis ...............................................................300Why Multiple Network Segments? .........................................300

Interconnection of TCP/IP Networks .............................................300The Network Mask .........................................................................302Creating Subnets ............................................................................302IP Prefixes .......................................................................................303IP Broadcast Addresses ...................................................................303

Limited Broadcast ....................................................................304Directed Broadcast ..................................................................304

CIDR ...............................................................................................305How CIDR Works ....................................................................305

Activities .........................................................................................308

Lesson 6IP Routing ..........................................................................310

Overview of Internet Architecture .................................................311Router Characteristics .............................................................312

Direct Routing ................................................................................312Indirect Routing .............................................................................314

Static Routing ..........................................................................315Default Routing .......................................................................316Dynamic Routing ....................................................................316

Building the Routing Table ............................................................317Sample Network Routing Table ..............................................318

How Routers Move Packets Between Networks .............................320Host A ......................................................................................321Packet on Network 128.1.0.0 ..................................................321Packet on Network 128.2.0.0 ..................................................322Packet on Network 128.3.0.0 ..................................................323Packet on Network 128.4.0.0 ..................................................324Host B ......................................................................................324

Activity ...........................................................................................325Summary ...........................................................................327Quiz ..................................................................................328

Unit 5TCP/IP Applications and Services ....................................331

Lesson 1HTTP .................................................................................340

HTTP Communications .................................................................340Overview of HTTP ..........................................................................341

Protocol Definition .................................................................342

i-Net+ Certification Study Guide

xii

Request Messages ...........................................................................343HTTP Methods ........................................................................343Uniform Resource Identifiers ..................................................344HTTP-Version ..........................................................................345

Response Messages .........................................................................345HTTP Headers .................................................................................348

General Headers ......................................................................349Request Headers ......................................................................349Response Headers ....................................................................350Entity Headers .........................................................................350Sample Request Messages ........................................................351

Additional Services .........................................................................352Activities .........................................................................................353

Lesson 2Telnet ................................................................................356

Common Telnet Uses .....................................................................356Telnet Server Software ....................................................................357Using Telnet by Means of a Command Line .................................357

Using Telnet With Windows ..................................................358Basic Telnet Commands ..........................................................359

Using Telnet by Means of a Web Browser .....................................360Activities .........................................................................................361

Lesson 3File Transfer: FTP ................................................................363

Why Use FTP? ................................................................................363FTP Server Software ........................................................................364Anonymous FTP .............................................................................364

Is Anonymous FTP Really Anonymous? .................................365Using FTP Clients ...........................................................................365

Using Command Line FTP ......................................................366Basic FTP Commands ..............................................................368Using FTP With a Browser .......................................................369Same Application, Different Interfaces ...................................370

Activities .........................................................................................371

Lesson 4Messaging: E-Mail and News .............................................372

Reading an E-Mail Address .............................................................372E-Mail Protocols .............................................................................373

SMTP ........................................................................................373Uuencode ................................................................................374MIME .......................................................................................374S/MIME ....................................................................................374POP3 ........................................................................................375IMAP4 ......................................................................................375

Mail Server Configuration ..............................................................376Store-and-Forward Mail Systems .............................................377

Contents

xiii

Table of C

on

tents

NNTP ..............................................................................................378Activities .........................................................................................380

Lesson 5IP Address Management: BOOTP, DHCP, and NAT ............383

BOOTP ............................................................................................383BOOTP Operation ...................................................................384

Client BOOTREQUEST Message .......................................384Server BOOTREPLY Message ............................................384

BOOTP Relay Agents ...............................................................385TFTP ................................................................................................385DHCP ..............................................................................................386

DHCP Address Allocation Mechanisms ..................................387DHCP Operation .....................................................................387

DHCP Services ..................................................................388How DHCP Clients Obtain Configuration Information .389DHCP Client Lease Renewal ............................................390

DHCP Relay Agents .................................................................390IP Address Conflicts ................................................................392

NAT ................................................................................................392NAT Address Spaces .................................................................393IP Address Translation .............................................................394

Static Address Translation ................................................394Dynamic Address Translation ..........................................394

Enhanced Network Security ....................................................395Masquerading/NAPT ...............................................................396

How NAPT Works ............................................................397NAPT for More Security ...................................................399

Activities .........................................................................................401

Lesson 6IP Name Resolution: HOSTS, DNS, and WINS ....................404

HOSTS File ......................................................................................405DNS ................................................................................................406

Hierarchical Structure .............................................................407TLDs .................................................................................407Distributed Authority .......................................................408Second-Level Subdomains ................................................409Zones ................................................................................410

Domain Names ........................................................................410Types of Domain Names ..................................................411Domain Name Syntax ......................................................411

DNS Client/Server Operation ..................................................411Name Servers ....................................................................412Resolvers ...........................................................................413Querying the Name Database ..........................................413

NetBIOS Name Resolution .............................................................414Broadcasts .........................................................................414LMHOSTS file ...................................................................414

i-Net+ Certification Study Guide

xiv

WINS ................................................................................414Name Resolution Challenges .........................................................415

Incompatible Systems .............................................................415Static vs. Dynamic ...................................................................415

Activities .........................................................................................416Summary ...........................................................................418Quiz ..................................................................................420

Unit 6Internet Clients and Servers ............................................425

Lesson 1Client Applications .............................................................431

Web Browsers .................................................................................431Viewing Pages Using Internet Explorer and

Netscape Navigator ..............................................................433Customizing Browsers .............................................................436

Internet Explorer ..............................................................436Netscape Navigator ..........................................................441

E-Mail Clients .................................................................................447Configuring Outlook Express ..................................................447Configuring Netscape Messenger ............................................449Inboxes and Address Books .....................................................449

Changing E-Mail Applications .........................................449Upgrading the Same E-Mail Application .........................449

E-Mail Privacy ..........................................................................450Signature Files .........................................................................450

Configuring Outlook ........................................................451Configuring Netscape Messenger .....................................452

News Accounts ...............................................................................452Configuring Outlook ...............................................................453Configuring Netscape Messenger ............................................453

Universal Clients ............................................................................454Upgrading and Maintaining Client Applications ..........................455Activities .........................................................................................457

Lesson 2Server Platforms .................................................................459

Server Components ........................................................................460Hardware Considerations ...............................................................461

Processor ..................................................................................461Random Access Memory .........................................................462Disk Drives ..............................................................................462Network Connectivity .............................................................463Additional Hardware ...............................................................463

Web Server Operating System Considerations ..............................464Desktop Operating Systems ....................................................464NOSs ........................................................................................465

Contents

xv

Table of C

on

tents

Apple Macintosh (Mac OS) ..............................................465Microsoft Windows 2000 .................................................465Microsoft Windows NT ....................................................466OS/2 Warp Server .............................................................466Commercial UNIX ............................................................467Linux ................................................................................467Novell NetWare ................................................................468

UNIX vs. Windows 2000 .........................................................469Administration .................................................................469Stability ............................................................................470Security .............................................................................470Product Availability ..........................................................471

Activities .........................................................................................472

Lesson 3Server Applications ............................................................476

Daemons and Services ....................................................................477Web Server Software .......................................................................477

Apache HTTP Server ................................................................478Microsoft IIS ............................................................................479Netscape/Sun iPlanet Web Server ...........................................480Other Web Server Choices ......................................................481

Zeus Web Server ...............................................................481Macromedia ColdFusion ..................................................481IBM WebSphere Application Server .................................481Oracle Application Server .................................................481

Web Server Software Considerations .............................................481Administration ........................................................................482Scalability ................................................................................482Server Management .................................................................482Security ....................................................................................483Multiple URL Hosting .............................................................483Product Integration .................................................................483

Server Tools ......................................................................484Development Tools ..........................................................484Web Browsers ...................................................................484

Vendor-Specific Features and Service Contracts .....................485Other Internet Servers ....................................................................485

E-Mail Servers ..........................................................................485FTP Servers ...............................................................................486News Servers ............................................................................486Media Servers ..........................................................................486DNS Servers .............................................................................486Certificate Servers ....................................................................487Directory (LDAP) Servers .........................................................487

Activities .........................................................................................489Summary ...........................................................................491Quiz ..................................................................................492

i-Net+ Certification Study Guide

xvi

Unit 7Building Web Pages .........................................................495

Lesson 1Creating Basic Web Pages ..................................................500

HTML Overview .............................................................................500Basic HTML Elements .....................................................................501

Basic Tag Types ........................................................................501Container Tags .................................................................501Empty Tags .......................................................................501

Tag Names ...............................................................................501Browser Versions and Tags ......................................................501Main Page Sections ..................................................................502Page Structure ..........................................................................502Attributes .................................................................................503

Create a Simple Web Page ..............................................................503Heading Tags ...........................................................................505Are End Tags Really Necessary? ...............................................505Plain Text ................................................................................506

Experiment With Heading Levels, Line Breaks, and Lists .............506Testing the Heading Levels .....................................................506Inserting Line and Paragraph Breaks ......................................507Creating Ordered and Unordered Lists ...................................508

Unordered Lists ................................................................510Ordered Lists ....................................................................510

Organizing Your HTML Code ........................................................510<META> Tags ..................................................................................511

Basic Metadata .........................................................................511Simulating HTTP Response Headers .......................................512

Activities .........................................................................................514

Lesson 2Adding Graphics ................................................................516

Inserting Horizontal Rules .............................................................516Inserting Graphic Files ...................................................................518Experiment With Inserting Graphic Files ......................................519Adding a Background .....................................................................522

Solid Color Backgrounds .........................................................522Repeating Graphic Backgrounds .............................................522A Word of Caution About Backgrounds .................................523

Activities .........................................................................................525

Lesson 3Adding Hyperlinks .............................................................527

Creating a Text Hyperlink ..............................................................527Creating a Relative Hyperlink ........................................................528Creating a Link From a Graphic ....................................................528Creating Links to Other Parts of the Current Page ........................528Activities .........................................................................................530

Contents

xvii

Table of C

on

tents

Lesson 4Formatting Text .................................................................531

Setting Default Text Attributes ......................................................531Text Color ...............................................................................531Link Text Color .......................................................................532Default Text Font ....................................................................532Default Text Size .....................................................................532Setting Multiple Default Attributes .........................................533

Setting Individual Text Attributes ..................................................533Activities .........................................................................................535

Lesson 5Incorporating Tables ..........................................................536

The Parts of a Table ........................................................................536Create a Table ..........................................................................536Add Formatting to Your Table ................................................538Add Cells to the Table Row .....................................................539More Table and Cell Formatting .............................................540

Activities .........................................................................................542

Lesson 6Working With Frames ........................................................544

Creating Frames .............................................................................544Frame Target Names ................................................................547

Activities .........................................................................................549

Lesson 7Using Forms ......................................................................551

Overall Form Attributes .................................................................551Form Fields and Controls ........................................................552

Hidden Form Fields ..........................................................552Drop-Down List Boxes ............................................................553Freeform Text Boxes ................................................................553

Manipulating the Form’s Data .......................................................554Creating a Test Form ...............................................................554

Activities .........................................................................................558

Lesson 8Graphic Formats ................................................................563

Challenges for the Multimedia Web Designer ..............................563Computer Hardware Limitations ............................................564Internet Connection Bandwidth ............................................564Color Inconsistencies ..............................................................564

Graphic File Formats ......................................................................565GIF Files ...................................................................................565

File Compression ..............................................................565GIF87a and GIF89a ..........................................................565Custom Palettes and Palette Reduction ...........................566

i-Net+ Certification Study Guide

xviii

JPEG Files .................................................................................566PNG Files .................................................................................567PDF Files ..................................................................................567Choosing a File Format ...........................................................568

Scalable Vector Graphics ................................................................568Activities .........................................................................................570

Lesson 9Multimedia Formats ...........................................................572

How Streaming Works ...................................................................572Plug-In Technology ........................................................................573Streaming Audio Formats ...............................................................574

RMF .........................................................................................574MPEG, MP3 .............................................................................575

RealAudio .......................................................................................576Animation Techniques ...................................................................577

Animated GIF Files ..................................................................577Flash ........................................................................................578

Streaming and Playback Performance ..............................578Virtual Reality Modeling Language ........................................579

Streaming Video Formats ...............................................................579RealVideo ................................................................................580Windows Media Player ...........................................................580

Complex Multimedia .....................................................................582QuickTime ...............................................................................582QuickTime Virtual Reality .......................................................583Shockwave ...............................................................................584

Activities .........................................................................................586Summary ...........................................................................588Quiz ..................................................................................589

Unit 8Dynamic Site Technologies .............................................595

Lesson 1Dynamic Sites and Databases ............................................600

The Need for Live Sites ...................................................................600Types of Dynamic Techniques .......................................................601

Gathering Data From Outside Sources ....................................601Time-Sensitive Pages ...............................................................601User-Supplied Data ..................................................................602Database-Driven Sites ..............................................................602

Database Concepts .........................................................................602Database Management Systems .....................................................603

SQL ..........................................................................................604UDA Specification ...................................................................604

Activities .........................................................................................607

Contents

xix

Table of C

on

tents

Lesson 2Common Gateway Interface Overview ..............................609

A Typical CGI Process ....................................................................610Exchanging Data With CGI ...........................................................611

Standard Input/Output (I/O) ..................................................611Environment Variables ...........................................................612

Difference Between GET and POST ................................................613GET Uses Environment Space .................................................613POST Uses Standard Input/Output (I/O) ................................614

Placing CGI Programs on a Web Server .........................................614Activities .........................................................................................615

Lesson 3Overview of Web Programming Technologies ...................616

Client-Side vs. Server-Side Scripting ..............................................616When to Run on the Client ....................................................617When to Run on the Server ....................................................618

Programming Languages and Tools ...............................................618Client-Side Technologies ........................................................619

ActiveX .............................................................................619Java Applets ......................................................................619JavaScript ..........................................................................620Jscript ................................................................................620

Server-Side Technologies .........................................................620Server-Side Includes .........................................................620 ASP ...................................................................................621ColdFusion .......................................................................622PHP ...................................................................................622Java Server Pages ..............................................................623Java Servlets ......................................................................623VBScript ............................................................................623Python ..............................................................................623 ADO .................................................................................624C/C++ ...............................................................................624Web Services .....................................................................624

Activities .........................................................................................626

Lesson 4Structured Content ............................................................628

The Need to Separate Content From Appearance .........................628Cascading Style Sheets ............................................................629

Structured Data ..............................................................................629SGML .......................................................................................630

XML ................................................................................................630Structured Data Means Independence ....................................630The XML Architecture .............................................................631

Elements ...........................................................................631Attributes ..........................................................................631DTD ..................................................................................631

i-Net+ Certification Study Guide

xx

Applications of XML ...............................................................632Complementary Standards ............................................................632

XSL ..........................................................................................632XLink .......................................................................................633XHTML ....................................................................................633WML ........................................................................................633

Activities .........................................................................................634Summary ...........................................................................635Quiz ..................................................................................636

Unit 9Troubleshooting ..............................................................639

Lesson 1Testing a Web Site and Web Server ...................................643

Overview of Systems Development Life Cycles .............................643Waterfall Cycle ........................................................................644Spiral Cycle ..............................................................................645Web Cycle? ..............................................................................646

Typical Levels of Testing ................................................................646Testing Principles ...........................................................................647

Follow the User .......................................................................647Testing Basic Site Functionality ..............................................647Stress Testing ...........................................................................648

A Few Testing Guidelines ...............................................................649Activities .........................................................................................651

Lesson 2Common Network Testing Tools .......................................652

Winipcfg, IPconfig, and IFconfig ...................................................653Winipcfg Operation ................................................................653IPconfig Operation ..................................................................655IFconfig Operation ..................................................................657

Ping ................................................................................................657Command-Line Switches ........................................................659

Tracert or Traceroute ......................................................................660Command-Line Switches ........................................................662

Netstat ............................................................................................662Command-Line Switches ........................................................664Repeating a Netstat Command ...............................................664

ARP .................................................................................................664How ARP Works ......................................................................665ARP for Troubleshooting .........................................................665Command-Line Switches ........................................................665Changing the ARP Cache ........................................................666

NSlookup ........................................................................................667Protocol Analyzers (Sniffers) ..........................................................668

Components of a LAN Protocol Analyzer ...............................669

Contents

xxi

Table of C

on

tents

Protocol Analyzer Traces .........................................................670Activities .........................................................................................672

Lesson 3Troubleshooting an Unreachable FTP Site ..........................675

The Problem ...................................................................................676Establish the Symptoms ..........................................................676Identify the Affected Area .......................................................676Establish What Has Changed ..................................................676Select the Most Probable Cause ..............................................677Implement a Solution .............................................................677Test the Result .........................................................................677Recognize the Potential Effects of the Solution ......................678Document the Solution ..........................................................678

Activities .........................................................................................679

Lesson 4Troubleshooting an Unreachable Web Site ........................680

The Problem ...................................................................................680Establish the Symptoms ..........................................................680Identify the Affected Area .......................................................680Establish What Has Changed ..................................................681Select the Most Probable Cause ..............................................681

Testing Internal Communications ...................................683Testing ISP Communications ...........................................684Testing Web Host Firm Communications .......................685Tallying the Test Results ..................................................685Isolating the Cause ...........................................................686

Implement a Solution .............................................................687Test the Result .........................................................................687Recognize the Potential Effects of the Solution ......................688Document the Solution ..........................................................688

Activities .........................................................................................689

Lesson 5Troubleshooting a Firewall Problem ...................................691

The Environment ...........................................................................691The Problem ...................................................................................692

Establish the Symptoms ..........................................................692Identify the Affected Area .......................................................692Establish What Has Changed ..................................................693Select the Most Probable Cause ..............................................693

Pause to Administer First Aid ...........................................693Continue to Isolate the Problem ......................................693

Implement a Solution .............................................................694Test the Result .........................................................................694Recognize the Potential Effects of the Solution ......................695Document the Solution ..........................................................695

Activities .........................................................................................696

i-Net+ Certification Study Guide

xxii

Lesson 6Troubleshooting a Home Office DSL Problem ....................697

The Environment ...........................................................................697The Problem ...................................................................................698

Establish the Symptoms ..........................................................698Identify the Affected Area .......................................................699Establish What Has Changed ..................................................700Select the Most Probable Cause ..............................................700Implement a Solution .............................................................700Test the Result .........................................................................701Recognize the Potential Effects of the Solution ......................701Document the Solution ..........................................................701

Activities .........................................................................................702Summary ...........................................................................703Quiz ..................................................................................704

Unit 10Security ............................................................................709

Lesson 1A Layered Approach to Security .........................................715

Security Threats ..............................................................................716Intentional Attacks ..................................................................716Network Vulnerabilities ..........................................................717

Layers of Security ...........................................................................718Security Policy .........................................................................719User Awareness Training .........................................................719

Acceptable Use Agreement ...............................................719Monitoring .......................................................................719Enforcement .....................................................................720

Physical Security ......................................................................720Encryption ...............................................................................721

Key Size and Encryption Strength ...................................724Legal Issues in Cryptography ...........................................724Commonly Used Encryption Systems .............................724

Access Control .........................................................................727User Authentication ................................................................727

Passwords .........................................................................728Smart Cards ......................................................................728Digital Certificates ............................................................729Biometric Authentication ................................................729Message Digests and Digital Signatures ...........................730

Firewalls ...................................................................................731IPSec ........................................................................................731Virus Prevention and Detection .............................................733Security Management .............................................................734

Activities .........................................................................................736

Contents

xxiii

Table of C

on

tents

Lesson 2Security Management .......................................................738

Types of Attacks .............................................................................738Multiple Login Failures ...........................................................739Denial of Service Attacks .........................................................739

Ping Flood Attacks ............................................................739Mail Flooding ...................................................................739Syn Floods ........................................................................739

IP Spoofing ..............................................................................739General Web Security Precautions .................................................740

Private Web Site Design ..........................................................740HTTP Server Access Control .............................................740

JavaScript .................................................................................742Java Applets (Active Content) .................................................742Stand-Alone Java Applications ................................................743Perl ...........................................................................................743

Operating System Precautions .......................................................744Internet Services Precautions .........................................................745

E-Mail (SMTP Sendmail) ..........................................................745HTTP Server (Web Server) .......................................................746TCP/IP Utilities ........................................................................747User Browser Setup: ActiveX Controls ....................................747Cookies ....................................................................................748

Responding to a Security Incident .................................................748Detection .................................................................................748Documentation .......................................................................749Communication ......................................................................749

Activities .........................................................................................750

Lesson 3Internet Firewalls ...............................................................752

Types of Firewalls ...........................................................................753Network Layer Firewalls ..........................................................753Transport Layer Firewalls ........................................................754Application Firewalls ...............................................................754Hybrid Firewalls ......................................................................755

Stance of a Firewall .........................................................................755Everything is Denied Unless Specifically Permitted ...............756Everything is Permitted Unless Specifically Denied ...............756

Cost of a Firewall ............................................................................756Components of a Firewall System .................................................756

Building Block: Packet-Filtering Router ..................................757Service-Dependent (Port) Filtering ...................................758Service-Independent Filtering ..........................................758Benefits of Packet-Filtering Routers .................................759Limitations of Packet-Filtering Routers ............................759Example 1: Packet-Filtering Router ..................................760

i-Net+ Certification Study Guide

xxiv

Building Block: Application-Level Gateway (Proxy Server) ....761Bastion Host .....................................................................762Example 2: Telnet Proxy ..................................................763Advantages of Proxy Servers ............................................765Disadvantages of Proxy Servers ........................................765

Building Block: Circuit-Level Gateway ...................................766SOCKS ...............................................................................767

Web Caching ...........................................................................768“Faster” or “Fresher” ........................................................769Example 3: Screened Host Firewall ..................................770Example 4: Dual-Homed Bastion Host ............................771Example 5: “Demilitarized Zone” or

Screened-Subnet Firewall ..............................................772Living With a Firewall ....................................................................773Activities .........................................................................................775

Summary ...........................................................................778Quiz ..................................................................................779

Course Quiz ......................................................................783

Glossary ............................................................................805

Index ................................................................................831